Performance Evaluation of IDEA encryption model under different Fading Channels

Authors(2) :-Jagruti A. Patil, Prof. Manish M. Patil

With the introduction of the computer and communication, huge amounts of digital information are gathered and stored in giant computer databases and transmitted between computers and terminal devices connected together in complicated communications networks. Without acceptable safeguards the confidentiality and integrity of certain information posses risk because data are vulnerable to interception, deletion, modification or addition throughout transmission. Need of a secured data transmission for exchanging information from one user to the other is increased because of advancements in processing and communication technology. The access of objects in encryption technique relies on key properties that are the basis for communication and authentication. The authentication requires the secured key for data encryption which should be possessed both by user and group. In Wireless Networks, numerous algorithms are used to encrypt/decrypt the message. In this paper the performance of international data encryption algorithm is checked. In proposed algorithm message is split into number of blocks. First block is encrypted using International data encryption algorithm (IDEA) and remaining blocks are EX-ored with the first block. The encrypted data is modulated using BPSK modulation and performance is evaluated in terms of bit error rate and throughput on Additive White gaussian Noise (AWGN) channel.

Authors and Affiliations

Jagruti A. Patil
P.G. Scholar, Department of E&TC, Gangamai College of Engineering, Dhule, Maharashtra, India
Prof. Manish M. Patil
Assistant Professor, Department of E&TC, Gangamai College of Engineering, Dhule, Maharashtra, India

IDEA , AWGN, Nakagami, Rayleigh, Rician,Fading, BER, SNR, Throughput.

  1. M. Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology, EUROCRYPT’93, Lecture Notes in Computer Science, vol. 765, T. Helleseth ed., Springer-Verlag, 1994.
  2. Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Springer Verlag, 1993.
  3. A. Menezes, P. Van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
  4. Xuelija Lai, On the Design and Security of Block Ciphers, Hartung-Gorre Verlag Konstanz, 1992.
  5. Vinod Shokeen, Niranjan Yadav, "Encryption and Decryption Technique for Message Communication", IJECT, Vol. 2, Issue 2, June 2011.
  6. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World, Prentice Hall PTR, 1995.
  7. "An overview of cryptography" Online available at: https://www.garykessler.net/library/crypto.html
  8. "An Introduction to Cryptography". Network Associates, Inc., 1999. Online available at: http://www.pgpi.org/doc/pgpintro.
  9. "The SSL Protocol", version 3.0. Netscape, Inc., 1999. Online available at: http://home.netscape.com/eng/ssl3/draft302.txt.
  10. Ekta Agrawal, Dr. ParashuRam. Pal, "Refined Polygram Substitution Cipher Method: A Enhanced Tool for Security", International Journal of Engineering and Innovative Technology (IJEIT), ISSN: 2277-3754, Volume 2, Issue 1, July 2012.
  11. Schneier, Bruce, Applied Cryptography. Protocols, Algorithms, and Source Code in C, New York: Wiley & Sons, 1996.
  12. Stallings, W. Cryptography and Network Security: Principles and Practice, Prentice-Hall, USA, Second Edition, 1999.
  13. S. Sudha, V. Madhu Viswanatham "Implementation of Enhanced Data Encryption Standard on MANET with less energy consumption through limited Computation" International Journal of Engineering Research and Development, Volume 2, Issue 4, July 2012.
  14. Yang Xiao, Bo Sun , Hsiao-Hwa Chen , Sghaier Guizani & Ruhai Wang "Performance Analysis of Advanced Encryption Standard (AES)," in IEEE Communications Society subject matter experts for publication in the IEEE Globocom proceedings 2006.
  15. Rania Salah el-Sayed "An Efficient Signature System Using Optimized RSA Algorithm" JCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008.
  16. Electronic Frontier Foundation, "DES challenge III broken in record 22 hours," January1999. Online available at http://www.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19990119_deschallenge3.html.
  17. J. Daemen, R. Govaerts, and J. Vandewalle, Weak keys for IDEA, Advances in Cryptology - Crypto '93, Springer-Verlag pp. 224-231, 1994.
  18. J. Borst, L.R. Knudsen and V. Rijmen, Two Attacks on Reduced IDEA, Advances in Cryptology - EUROCRYPT 1997, Springer-Verlag, pp. 1-13, 1992.
  19. T. M. Cover and A. A. E. Gamal, "Capacity theorems for relay channel", IEEE Trans info Theory,vol.25, no.5,pp. 572-84, Sept 1979.
  20. A. Sudhir Babu, Dr. K.V Sambasiva Rao, "Evaluation of BER for AWGN, Rayleigh and Rician Fading Channels under Various Modulation Schemes", International Journal of Computer Applications, ISSN: 0975 – 8887, Volume 26, No.9, July 2011.
  21. Nuzhat Tasneem Awon, Md. Mizanur Rahman, Md. Ashraful Islam, A. Z. M. Touhidul Islam, "Effect of AWGN & Fading (Raleigh & Rician) channels on BER performance of a WiMAX communication System", International Journal of Computer Science and Information Security (IJCSIS), Vol. 10, No. 8, August 2012.
  22. M. N. Rindani, A. A. Bavarva, "Ber Performance Comparison of 4×4 Extended Alamouti Scheme for Different Fading Channels", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 3, March 2013.
  23. Battu Deepa, P.Sudhakara Reddy, "Comparison of Bit Error Rate and Signal to Noise Ratio for Multi-User MIMO Wireless Applications", International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Vol. 3, Issue 3, August 2013.
  24. Sutanu Ghosh, "Performance Analysis on the basis of a Comparative Study between Multipath Rayleigh Fading and AWGN Channel in the presence of various Interference", International journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 4, No.1, February 2014
  25. Vinod Shokeen, Niranjan Yadav, "Encryption and Decryption Technique for Message Communication",International Journal of Electronics & Communication Technology (IJECT), ISSN: 2230-7109, Vol. 2, Issue 2, June 2011.
  26. E. Thambiraja & Dr. R. Umarani , "A Survey on Various Most Common Encryption Techniques", International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 2, Issue 7, July 2012.
  27. Mustafa M. Matalgah, Amer M. Magableh, "Simple Encryption Algorithm with Improved Performance in Wireless Communications", IEEE, Radio and Wireless Symposium (RWS), January 2011.
  28. Agarwal, Dafouti & Tyagi "Performance analysis of data encryption algorithms (DES)", Electronics Computer Technology (ICECT), 3rd International Conference on 10 April 2011.
  29. Suying Yang, Hongyan Piao, Li Zhang and Xiaobing Zheng, "An Improved IDEA Algorithm Based on USB Security Key", Third International Conference on Natural Computation (ICNC), 2007.
  30. De-Hong ZHU, "An Attack on 5.5-round IDEA", IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS), Vol. 2, PP. 18 – 21, 2010.
  31. Sandipan Basu "International data encryption algorithm (IDEA)" Journal of Global Research in Computer Science Volume 2, No. 7, July 2011.
  32. Harivans Pratap Singh, Shweta Verma, Shailendra Mishra, "Secure-International Data Encryption Algorithm", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, ISSN: 2278 – 8875, Vol. 2, Issue 2, February 2013.
  33. Archita Bhatnagar, Monika Pangaria, Vivek Shrivastava, "converting international data encryption algorithm (idea) into asymmetric key cipher", International Journal of Innovative Research in Science, Engineering and Technology volume 2 issue 10, October 2013
  34. Ayushi, "A Symmetric Key Cryptographic Algorithm",2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15

Publication Details

Published in : Volume 4 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 323-330
Manuscript Number : IJSRSET184168
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Jagruti A. Patil, Prof. Manish M. Patil, " Performance Evaluation of IDEA encryption model under different Fading Channels, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.323-330, January-February.2018
URL : http://ijsrset.com/IJSRSET184168

Follow Us

Contact Us